咨询与建议

限定检索结果

文献类型

  • 3,531 篇 会议
  • 2,363 篇 期刊文献
  • 43 册 图书

馆藏范围

  • 5,937 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 3,718 篇 工学
    • 2,848 篇 计算机科学与技术...
    • 2,336 篇 软件工程
    • 982 篇 信息与通信工程
    • 572 篇 控制科学与工程
    • 523 篇 电气工程
    • 418 篇 生物工程
    • 341 篇 电子科学与技术(可...
    • 254 篇 网络空间安全
    • 241 篇 生物医学工程(可授...
    • 219 篇 机械工程
    • 201 篇 安全科学与工程
    • 181 篇 光学工程
    • 152 篇 仪器科学与技术
    • 149 篇 动力工程及工程热...
    • 136 篇 化学工程与技术
    • 135 篇 交通运输工程
  • 1,585 篇 理学
    • 831 篇 数学
    • 455 篇 生物学
    • 326 篇 物理学
    • 264 篇 统计学(可授理学、...
    • 216 篇 系统科学
    • 144 篇 化学
  • 977 篇 管理学
    • 618 篇 管理科学与工程(可...
    • 399 篇 图书情报与档案管...
    • 307 篇 工商管理
  • 300 篇 法学
    • 191 篇 社会学
  • 269 篇 医学
    • 218 篇 临床医学
    • 200 篇 基础医学(可授医学...
    • 122 篇 公共卫生与预防医...
  • 129 篇 经济学
    • 128 篇 应用经济学
  • 58 篇 农学
  • 50 篇 教育学
  • 41 篇 军事学
  • 16 篇 文学
  • 13 篇 艺术学
  • 1 篇 历史学

主题

  • 220 篇 accuracy
  • 202 篇 deep learning
  • 183 篇 feature extracti...
  • 182 篇 machine learning
  • 180 篇 security
  • 158 篇 internet of thin...
  • 155 篇 training
  • 143 篇 computational mo...
  • 126 篇 authentication
  • 118 篇 real-time system...
  • 103 篇 privacy
  • 96 篇 support vector m...
  • 96 篇 blockchain
  • 95 篇 cryptography
  • 94 篇 predictive model...
  • 94 篇 protocols
  • 89 篇 artificial intel...
  • 83 篇 convolutional ne...
  • 77 篇 data models
  • 74 篇 optimization

机构

  • 213 篇 school of cyber ...
  • 168 篇 institute of inf...
  • 68 篇 college of cyber...
  • 60 篇 school of comput...
  • 58 篇 school of cyber ...
  • 57 篇 school of cyber ...
  • 53 篇 school of comput...
  • 50 篇 school of cyber ...
  • 49 篇 school of cyber ...
  • 42 篇 department of me...
  • 42 篇 college of compu...
  • 41 篇 department of co...
  • 41 篇 state key labora...
  • 38 篇 department of co...
  • 37 篇 department of cy...
  • 37 篇 department of co...
  • 33 篇 department of co...
  • 31 篇 school of comput...
  • 29 篇 college of compu...
  • 28 篇 department of el...

作者

  • 51 篇 choo kim-kwang r...
  • 41 篇 zhou pan
  • 34 篇 das ashok kumar
  • 30 篇 huang qingming
  • 28 篇 cao xiaochun
  • 26 篇 mohammad kamrul ...
  • 26 篇 muhaidat sami
  • 25 篇 hai jin
  • 22 篇 hu shengshan
  • 20 篇 sofotasios pasch...
  • 20 篇 wang wei
  • 19 篇 peng hao
  • 19 篇 yang zhiyong
  • 19 篇 walid el-shafai
  • 18 篇 ashok kumar das
  • 18 篇 kim-kwang raymon...
  • 18 篇 jin hai
  • 17 篇 ma jianfeng
  • 17 篇 han zhu
  • 17 篇 mahmood khalid

语言

  • 5,320 篇 英文
  • 556 篇 其他
  • 62 篇 中文
  • 1 篇 德文
  • 1 篇 法文
  • 1 篇 日文
  • 1 篇 朝鲜文
检索条件"机构=Department of Cyber Security and Computer Engineering Technology"
5937 条 记 录,以下是4761-4770 订阅
排序:
Vision Inspection of Bottle Caps in Drink Factories Using Convolutional Neural Networks
Vision Inspection of Bottle Caps in Drink Factories Using Co...
收藏 引用
IEEE International Conference on Intelligent computer Communication and Processing (ICCP)
作者: Mahdi Bahaghighat Fereshteh Abedini Misak S’hoyan Arthur-Jozsef Molnar Department of Electrical Engineering Raja University Qazvin Iran Department of Electrical Engineering Amirkabir University of Technology Tehran Iran Department of Information Security National Polytechnic University of Armenia Yerevan Iran Faculty of Mathematics and Computer Science Babeş-Bolyai University Cluj-Napoca Romania
Nowadays, the growth and development of artificial intelligence is more evident than any other time. Consequently, the development of machine vision systems in the industry has been studied extensively. The provision ...
来源: 评论
Adversarial Attacks on Remote User Authentication Using Behavioural Mouse Dynamics
arXiv
收藏 引用
arXiv 2019年
作者: Tan, Yi Xiang Marcus Iacovazzi, Alfonso Homoliak, Ivan Elovici, Yuval Binder, Alexander ST Engineering Electronics-SUTD Cyber Security Laboratory Pillar Singapore University of Technology and Design Singapore Department of Software and Information Systems Engineering Ben-Gurion University of the Negev Beer-Sheva Israel Deutsche Telekom Innovation Laboratories Ben-Gurion University of the Negev Beer-Sheva Israel
—Mouse dynamics is a potential means of authenticating users. Typically, the authentication process is based on classical machine learning techniques, but recently, deep learning techniques have been introduced for t... 详细信息
来源: 评论
Erratum to “High-Efficiency Min-Entropy Estimation Based on Neural Network for Random Number Generators”
收藏 引用
security and Communication Networks 2020年 第1期2020卷
作者: Na Lv Tianyu Chen Shuangyi Zhu Jing Yang Yuan Ma Jiwu Jing Jingqiang Lin State Key Laboratory of Information Security Institute of Information Engineering Chinese Academy of Sciences Beijing 100093 *** Data Assurance and Communications Security Research Center Chinese Academy of Sciences Beijing 100093 *** School of Cyber Security University of Chinese Academy of Sciences Beijing 100093 *** China Information Technology Security Evaluation Center Beijing 100085 *** School of Computer Science and Technology University of Chinese Academy of Sciences Beijing 100093 ***
来源: 评论
A Note on Self-Accelerating Olver and Olver-Gauss Beams
收藏 引用
Optics and Photonics Journal 2019年 第1期9卷 1-7页
作者: Ioannis M. Besieris Amr M. Shaarawi Bradley Davis The Bradley Department of Electrical and Computer Engineering Virginia Polytechnic Institute and State University Blacksburg VA USA Department of Physics The American University in Cairo New Cairo Egypt Ted and Karyn Hume Center for National Security and Technology Virginia Polytechnic Institute and State University Blacksburg VA USA
The recent introduction by Belafhal et al. [Opt. and Photon. J. 5, 234-246 (2015)] of mth-order Olver beams as a novel class of self-accelerating nondiffracting solutions to the paraxial equation is a direct contradic... 详细信息
来源: 评论
Digital Contact Tracing Service: An improved decentralized design for privacy and effectiveness
arXiv
收藏 引用
arXiv 2020年
作者: Holzapfel, Kilian Karl, Martina Lotz, Linus Carle, Georg Djeffal, Christian Fruck, Christian Haack, Christian Heckmann, Dirk Kindt, Philipp H. Köppl, Michael Krause, Patrick Shtembari, Lolian Marx, Lorenz Meighen-Berger, Stephan Neumair, Birgit Neumair, Matthias Pollmann, Julia Pollmann, Tina Resconi, Elisa Schönert, Stefan Turcati, Andrea Wiesinger, Christoph Zattera, Giovanni Allan, Christopher Barco, Esteban Bitterschulte, Kai Buchwald, Jörn Fischer, Clara Gampe, Judith Häcker, Martin Islami, Jasin Pomplun, Anatol Preisner, Sebastian Quast, Nele Romberg, Christian Steinlehner, Christoph Ziehm, Tjark Department of Physics Technical University of Munich Garching bei München Germany Max Planck Institute for Physics Munich Germany Department of Informatics Technical University of Munich Garching bei München Germany TUM School of Governance Munich Center for Technology in Society Technical University of Munich Munich Germany TUM School of Governance Department of Informatics Chair of Law and Security in Digital Transformation Technical University of Munich Munich Germany Department of Electrical and Computer Engineering Chair of Real-Time Computer Systems Technical University of Munich Munich Germany ito-app Ober-Olm Germany
We propose a decentralized digital contact tracing service that preserves the users’ privacy by design while complying to the highest security standards. Our approach is based on Bluetooth and measures actual encount... 详细信息
来源: 评论
Privacy-preserving medical treatment system through nondeterministic finite automata
arXiv
收藏 引用
arXiv 2020年
作者: Yang, Yang Deng, Robert H. Liu, Ximeng Wu, Yongdong Weng, Jian Zheng, Xianghan Rong, Chunming School of Information Systems Singapore Management University Singapore College of Mathematics and Computer Science Fuzhou University Fujian China State Key Laboratory of Integrated Services Networks Xidian University Guangdong Provincial Key Laboratory of Data Security and Privacy Protection Guangzhou China Fujian Provincial Key Laboratory of Information Processing and Intelligent Control Minjiang University Fuzhou China School of Information Systems Singapore Management University Singapore Singapore Department of Computer Science Jinan University Guangdong China College of Mathematics and Computer Science Fuzhou University Fujian China Department of Electronic Engineering and Computer Science University of Stavanger Norway MingByte Technology Qingdao China
In this paper, we propose a privacy-preserving medical treatment system using nondeterministic finite automata (NFA), hereafter referred to as P-Med, designed for the remote medical environment. P-Med makes use of the... 详细信息
来源: 评论
Research and Implementation of Precision Marketing System Based on Big Data Analysis  5
Research and Implementation of Precision Marketing System Ba...
收藏 引用
2018 5th International Conference on Advanced Composite Materials and Manufacturing engineering, ACMME 2018
作者: Wang, Ling Xu, Haochen Cao, Yan School of Cyber Security Gansu Institute of Political Science and Law Gansu730070 China Hefei University of Technology Department of Business Xuancheng242000 China School of Electronic and Information Engineering Lanzhou Jiaotong University Lanzhou730070 China
For the data analysis in the mass data, the data processing ability of the recommendation system is very high. Various kinds of high performance computing frameworks are produced with the Spark, and the computing abil... 详细信息
来源: 评论
Erratum to: The formation mechanism of aqueous hydrogen peroxide in a plasma-liquid system with liquid as the anode
收藏 引用
The European Physical Journal D 2020年 第7期74卷 1-2页
作者: Lin, Jiao He, Xinyi Chen, Qiang Xiong, Qing Li, Junshuai Wang, Xin Chen, Guolong Liu, Qing Huo Ostrikov, Kostya (Ken) Institute of Electromagnetics and Acoustics Fujian Provincial Key Laboratory of Plasma and Magnetic Resonance Department of Electronic Science Xiamen University Xiamen P.R. China State Key Laboratory of Power Transmission Equipment & System Security and New Technology Chongqing University Chongqing P.R. China Key Laboratory of Special Function Materials & Structure Design of the Ministry of Education School of Physical Science & Technology Lanzhou University Lanzhou P.R. China Department of Electrical and Computer Engineering Duke University Durham USA Institute for Future Environments and School of Chemistry Physics and Mechanical Engineering Queensland University of Technology Brisbane Australia CSIRO-QUT Joint Sustainable Processes and Devices Laboratory Commonwealth Scientific and Industrial Research Organization Lindfield Australia
We find that we made a mistake in the estimation of the H2O2 concentration by the colorimetric method in our previous paper (J. Lin et al., Eur. Phys. J. D (2020) 74: 80) [1].
来源: 评论
Delay-Aware Adaptive Wireless Video Streaming in Edge Computing Assisted Ultra-Dense Networks
Delay-Aware Adaptive Wireless Video Streaming in Edge Comput...
收藏 引用
2019 IEEE Global Communications Conference (GLOBECOM)
作者: Liang Li Ronghui Hou Ruoguang Li Hui Li Miao Pan Zhu Han School of Cyber Engineering Xidian University P. R. China Science and Technology on Communication Networks Laboratory School of Electronic Engineering Beijing University of Posts and Telecommunications Beijing P.R.China Department of Electrical and Computer Engineering University of Houston Houston TX
Server and Network Assisted Dynamic adaptive streaming over HTTP (SAND) is a promising technology to cope with the dramatic increase in video streaming traffic. The new emerging Mobile Edge Computing (MEC) paradigm ma... 详细信息
来源: 评论
Deep Learning for Password Guessing and Password Strength Evaluation, A Survey
Deep Learning for Password Guessing and Password Strength Ev...
收藏 引用
IEEE International Conference on Trust, security and Privacy in Computing and Communications (TrustCom)
作者: Tao Zhang Zelei Cheng Yi Qin Qiang Li Lin Shi Guangxi Key Laboratory of Cryptography and Information Security Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Trusted Software Guilin University of Electronic Technology Guilin China Guangxi Key Laboratory of Hybrid Computation and IC Design Analysis Guangxi University for Nationalities Nanning China Department of Computer and Information Technology Purdue University West Lafayette USA PLA Information Engineering University Zhengzhou China Henan Key Laboratory of Network Cryptography Technology Zhengzhou China Cloud Computing and Big Data Research Institute China Academy of Information and Communications Technology Beijing China
Text passwords are the most widely used authentication methods and will also be used in the future. Text passwords can be regarded as meaningful strings, and deep learning methods have an advantage of text processing.... 详细信息
来源: 评论